Legal
Security testing authorization
This document sets the minimum written authorization and operational conditions CyberSec expects before performing intrusive security services such as penetration testing, vulnerability assessments, ethical hacking, and validation exercises. It supports both website-delivered services and platform-adjacent engagements, but it does not replace signed statements of work, master services agreements, or engagement-specific authorization letters.
Canonical artefact metadata
- Owner
- CyberSec Legal and Trust Office
- Approver
- CyberSec Executive Governance
- Version
- 1.0.0
- Last reviewed
- 2026-04-20
- Next review due
- 2026-10-20
Customer pre-test obligations
- Take backups and resilience steps appropriate to the environment and materiality of the systems under test.
- Notify internal stakeholders, operations teams, and service owners on a need-to-know basis where appropriate.
- Identify sensitive, fragile, recently changed, safety-critical, or business-critical systems that require special handling.
- Confirm whether any third-party managed services, shared hosting, or customer-owned tenant environments need separate authorization or constraints.
CyberSec operational commitments
- Use reasonable care, professional judgment, and scope controls during the authorized testing window.
- Notify the customer contact promptly if a serious exploitable issue, unexpected instability, or confirmed access to sensitive information is identified.
- Treat data and evidence collected during the engagement as confidential and limit use to service delivery, work-paper support, legal obligations, and defence of rights.
- Remove temporary testing tooling where practicable after the engagement and minimize retained data when it is no longer required.
Risk allocation and hold-harmless position
Because intrusive testing necessarily uses methods that may resemble hostile activity, the customer must acknowledge the operational risks of the agreed testing approach and confirm that CyberSec may perform the scoped work without being treated as an unauthorized actor within that scope.
Any indemnity, limitation of liability, or hold-harmless commitment must be stated in the signed engagement documents. CyberSec does not rely on a generic website notice as the sole source of those protections; the formal contract and the signed authorization letter remain the controlling instruments.
Template short form
We, [Customer Legal Name], authorize CyberSec Consultants to perform the security testing activities described in the applicable statement of work or scoping document against the systems, applications, infrastructure, and IP ranges identified as in scope for the agreed engagement window.
We confirm that the undersigned has authority to provide this authorization, that all required third-party permissions and internal approvals have been obtained, and that reasonable pre-test precautions such as backups, stakeholder communications, and change coordination have been completed where necessary.
We acknowledge that intrusive security testing may cause alerts, instability, interruption, or incidental access to sensitive information even where reasonable care is exercised. CyberSec Consultants is authorized to conduct the scoped work in full knowledge of those risks, subject to the confidentiality, liability, indemnity, and hold-harmless terms agreed in the signed engagement documents.